boozallen / devsecops-example-helloworld

Example of a CI/CD Pipeline using Jenkins Multi-branch Pipelines hosted at AWS

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

DevSecOps CI/CD Pipeline Example

Jenkins Multibranch Pipeline

This example uses a Jenkins multi-branch pipelines. The code for this pipeline can be found here.

Jenkins multi-branch pipelines build all your branches in your repository under source code control (e.g. github) automatically. Note that you can explicitly include/exclude branch using regular expressions. This allows for a development approach with short-lived feature and bugfix branches that can be build, deployed, and tested simultaneously. This is important, because it allows developers to update and test the pipeline as part of the change request (or bugfix) they are working on, so the pipeline code always stays in sync with the the application code. Furthermore, "standard" development processes can now not only be applied to the application code, but also to the pipeline code, specifically source code control, testing, and code review.

Pipeline Steps

  1. Build the Java Spring Boot application using Apache Maven This includes running unit tests.
  2. Performs a security scan on the Java code base using SonarQube via Maven
  3. Build and register a version of the Docker image
  4. Deploy the image to the dev environment
  5. Run the automated browser tests against the application in the dev environment. The browser tests are written in Python using the Python Selenium Webdriver API binding.
  6. Deploy the image to the test environment
  7. Run the automated browser tests against the application in the test environment
  8. Pause for confirmation that the new image can be deployed to the prod environment. Allow for some manual tests to be executed before This step times out after some (configurable amount of) time.
  9. Deploy the image to the prod (or live) environment

Web Application: Hello World web app

Pipeline executions: Jenkins Pipeline

Pause step (step 8): Pause Pipeline

SonarQube (security scan) output: SonarQube

Note that in the above steps, steps 5 and up in the pipeline are only executed against the master branch. The pipeline code is configured to treat development (feature/bugfix) branches as additional dev environments. These temporary additional dev environments can quickly be created using the application's cloud-formation script and setting the Environment parameter to dev-<branch-name> and the SecurityContext parameter to dev. The new dev-<branch-name> environment now operates in the same security context as the dev environment`.

Now when a new temporary development branch is created of the master branch, the Jenkins pipeline will automatically discover the new branch and execute the pipeline code from that specific branch allow a developer to build and test the branch specific changes in isolation, including changes to the pipeline code.

Multiple branch executions (feature1 and master) after creating the feature1 branch: Multiple branch executions

Development branch (feature) execution details: Multiple branch executions

Development Process

The following outlines how this development pipeline would be used in a (typical) development process:

  1. A user story (or bug) ticket is assigned to a developer
  2. Create a temporary and short-lived development (feature/bugfix) branch environment using the Hello World application cloud formation script. Run the script setting the Environment parameter to dev-<name> and the the SecurityContext parameter to dev.
  3. A development branch is created in the repository using the format feature/ or bug-fix/ from the master branch
  4. The developer implements and tests the changes, include new and/or updated automated tests.
  5. Changes are committed to the branch and tested. The developer references the ticket in the commit message to allow for integration with the ticketing system, e. GitHub-Jira Integration.
  6. Changes are pushed to the central git server.
  7. A git webhook triggers the Jenkins pipeline for the feature branch.
  8. If pipeline build fails, either fix infrastructure issue, or return to step 3
  9. Manually test the changes
  10. Once satisfied acceptance criteria are met, create a Pull Request (PR) to the master branch and assign a reviewer.
  11. Reviewer verifies changes.
  12. If not accepted, return to step 3
  13. Reviewer accepts changes, the reviewer or developer merges the PR into master and deletes the branch
  14. Delete the temporary development branch environment.
  15. A git webhook triggers the Jenkins pipeline for the master branch
  16. Manual tests (if any are executed against the Test environment
  17. If problems are detected, return to step 3
  18. Accept changes and push to production

Possible Extensions

  1. Automate the creation and deletion of temporary development branch environment
  2. Create separate test suites to allow for a smoke vs. a full suite of tests. Smoke tests would always be applied to each environment, including production. The full suite of tesst would only be executed against pre-production environments.
  3. Application/browser tests are executed against all targetted brower/platform configurations using a hosted service, such as Browserstack or Saucelabs.
  4. Add performance testing in the pipeline, e.g. using Taurus and/or Apache jMeter.
  5. Penetration tests are executed as part of the pipeline,e.g. using OWAPS' ZAProxy
  6. Integrate a notification mechanism with the pipeline, e.g. Slack
  7. If an Restful API component is added, use Newman to run API tests using Postman test collections via Newman Docker image.

How to Install

Installation instructions can be found here.

About

Example of a CI/CD Pipeline using Jenkins Multi-branch Pipelines hosted at AWS


Languages

Language:Python 99.5%Language:Shell 0.3%Language:Java 0.1%Language:C 0.0%Language:CSS 0.0%